International Journal of Engineering
Trends and Technology

Research Article | Open Access | Download PDF

Volume 20 | Number 2 | Year 2015 | Article Id. IJETT-V20P240 | DOI : https://doi.org/10.14445/22315381/IJETT-V20P240

Anti-Phishing Structure Based On Visual Cryptography and RSA Algorithm


Sayali Vaidya , Shreya Zarkar , Prof. Achal N. Bharambe , Arifa Tadvi , Tanashree Chavan

Citation :

Sayali Vaidya , Shreya Zarkar , Prof. Achal N. Bharambe , Arifa Tadvi , Tanashree Chavan, "Anti-Phishing Structure Based On Visual Cryptography and RSA Algorithm," International Journal of Engineering Trends and Technology (IJETT), vol. 20, no. 2, pp. 209-213, 2015. Crossref, https://doi.org/10.14445/22315381/IJETT-V20P240

Abstract

Now-a-days online attacks have increased to a great extent and the most popular attack among them is phishing. Phishing can be basically defined as one kind of attack in which various attackers acquire the confidential and sensitive information of the victims. Thus, security in such cases should be very high to avoid the online attacks. Phishing steals the confidential information such as password, credit card information, etc which is carried out by fraudsters. So it is very much important for the users to identify the fake website and avoid falling prey to it. In this paper we have proposed a new approach named as “Anti-phishing structure based on visual cryptography and RSA algorithm" to solve the problem of phishing. Here an image based authentication using Visual Cryptography (VC) and the encryption algorithm is used. Visual cryptography is mainly done by splitting the original image into two shares one with user database and one with the server database. And the original image can be obtained only by both the shares of the image.

Keywords

Phishing, Visual cryptography, Encryption Algorithm, RSA, Decryption, Visual Cryptographic Scheme.

References

[1] Divya James and Mintu Philip, A Novel Anti-phishing framework based on visual Cryptography, 2012.
[2] M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.
[3] A. Shamir, .How to Share a Secret, Communication ACM, vol. 22, 1979, pp. 612-613.
[4] G. R. Blakley, Safeguarding Cryptographic Keys, Proceedings of AFIPS Conference, vol. 48, 1970, pp. 313-317.
[5] A. Menezes, P. Van Oorschot and S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, FL, 1997.
[6] B. Borchert, .Segment Based Visual Cryptography, WSI Press, Germany, 2007.

Time: 0.0013 sec Memory: 32 KB
Current: 1.87 MB
Peak: 4 MB